Month: September 2015

This week in our blog, we offer a snapshot of cybersecurity, privacy and data security news of interest to the executive suite. Periodically, we’ll recap insights from the growing cadre of voices in this space as well as lend our own views on the issues that impact executive governance of cyber risk and response. Many[…]

Last December an article in Tech News World took a shot at forecasting the year ahead in cybersecurity. Among the predictions in the article was this from SentinelOne, a leading provider of endpoint protection, “Cybercriminals will train their gaze on Apple more often next year…An acceleration of those attacks is likely…because Apple continues to grow its[…]

The supreme art of war is to subdue the enemy without fighting. – Sun Tzu Sun Tzu, noted Chinese general and philosopher, is widely perceived as a master military strategist. He is known for authoring The Art of War, a treatise on military strategy and tactics that has survived the test of time, having been[…]

Last fall the Federal Bureau of Investigation took the historically notable step of issuing a private warning to industry about a group of Chinese government hackers that were stealing data from U.S. companies and government agencies. The FBI sent a nine page alert (http://www.slideshare.net/ragebeast/infragard-hikitflash) that said the Chinese hackers were using at least four “zero-day[…]

̶ Ask not for whom the bell tolls, it tolls for thee. John Donne’s famous “Meditation XVII” offers a haunting reflection on humanity. It also serves as an apt reference for the meaning of the recent decision by the U.S. Court of Appeals for the 3rd Circuit upholding the Federal Trade Commission’s (FTC) authority to[…]